B. R. Chandavarkar

Orcid: 0000-0001-6944-875X

Affiliations:
  • National Institute of Technology Karnataka, Surathkal, India


According to our database1, B. R. Chandavarkar authored at least 67 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Integration of Synergetic IoT Applications with Heterogeneous Format Data for Interoperability Using IBM ACE.
SN Comput. Sci., January, 2024

2023
Novel Fuzzy-based Objective Function for routing protocol for low power and lossy networks.
Ad Hoc Networks, May, 2023

Media Independent Handover and Mobile IPv6-Based UDP Performance Evaluation Suite for Heterogeneous Wireless Networks.
Wirel. Pers. Commun., March, 2023

Hop-based void avoidance routing protocol for underwater acoustic sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2023

Enhanced Link Quality-based Routing Protocol for underwater networks.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Predictive Selective Repeat - an Optimized Selective Repeat for Noisy Channels.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Deep Learning based framework for dynamic Detection and Mitigation of ARP Spoofing attacks.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

A Comparative Analysis of Traditional versus Blockchain-based Voting Systems.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Study of Topological Connectivity of Optical Networks Using Graph Spectra.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

BlockFIR: Blockchain based First Information Report System.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Collision Resolution of VANET Nodes for TDMA MAC Protocol.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Improving Dynamic TDMA for Wireless Sensor Networks.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2022
Location-Free Void Avoidance Routing Protocol for Underwater Acoustic Sensor Networks.
Wirel. Pers. Commun., 2022

Resource-Aware Cryptography: An Analysis of Lightweight Cryptographic Primitives.
SN Comput. Sci., 2022

Unconfirmed Transactions in Cryptocurrency: Reasons, Statistics, and Mitigation.
Proceedings of the IEEE International Conference on Public Key Infrastructure and its Applications, 2022

Hop-count Based Routing Protocols for Underwater Acoustic Sensor Networks: A Survey.
Proceedings of the 13th International Conference on Computing Communication and Networking Technologies, 2022

2021
Correction to: Social Engineering Attacks During the COVID-19 Pandemic.
SN Comput. Sci., 2021

Social Engineering Attacks During the COVID-19 Pandemic.
SN Comput. Sci., 2021

Mitigating Blackhole attack of Underwater Sensor Networks.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Comparing CNNs and GANs for Image Completion.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Intrusion Detection of Sinkhole Attack in Underwater Acoustic Sensor Networks.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Link and Void Aware Routing Protocol for Underwater Acoustic Sensor Networks.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Temperature- and SNR-based On Demand Routing Protocol for Underwater Communication.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Data Processing in IoT, Sensor to Cloud: Survey.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

DDOS prevention in IoT.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Routing Criteria for Low Power and Lossy Networks.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Mitigating unsecured data forwarding related attack of underwater sensor network.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Dependency of routing protocol on pH and SNR in Underwater Communications.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

A Comprehensive Review on Wireless Technologies and their Issues with Underwater Communications.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Mitigating Neighborship Attack in Underwater Sensor Networks.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Comparative Analysis of Modern Mobile Operating Systems.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Demonstration of Selective Forwarding Attack and Detection Mechanism in UnetStack3.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Sybil Attack Simulation and Mitigation in UnetStack.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Predictive analytics and data mining in healthcare.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Deep Learning Techniques for Artistic Image Transformations: A Survey.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Analysis of the Standard Objective Functions of RPL.
Proceedings of the Evolution in Computational Intelligence, 2021

Computational Complexity Analysis of Block Ciphers of Transport Layer Security.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
Expectation-Based Multi-Attribute Multi-Hop Routing (EM<sup>2</sup> R) in Underwater Acoustic Sensor Networks.
Proceedings of the 15th IEEE International Conference on Industrial and Information Systems, 2020

A Framework for Residual Energy Model in UnetStack Simulator for Underwater Sensor Networks.
Proceedings of the 5th International Conference on Computing, Communication and Security, 2020

Use Cases of Authentication Protocols in the Context of Digital Payment System.
Proceedings of the 11th International Conference on Computing, 2020

Automated versus Manual Approach of Web Application Penetration Testing.
Proceedings of the 11th International Conference on Computing, 2020

Techniques To Secure Address Resolution Protocol.
Proceedings of the 11th International Conference on Computing, 2020

An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt.
Proceedings of the 11th International Conference on Computing, 2020

Link Quality-based Routing Protocol for Underwater Acoustic Sensor Networks.
Proceedings of the 11th International Conference on Computing, 2020

Remote User Authentication and Issues: A Survey.
Proceedings of the 11th International Conference on Computing, 2020

Implementation of Ship Motion Mobility Model in UnetStack for Underwater Sensor Networks.
Proceedings of the 11th International Conference on Computing, 2020

Undeniable Signature Scheme: A Survey.
Proceedings of the 11th International Conference on Computing, 2020

A Mathematical Model for Node Mobility during Water Current and Tsunami in Underwater Sensor Networks.
Proceedings of the 11th International Conference on Computing, 2020

Mitigating Man-in-the-Middle Attack in Digital Signature.
Proceedings of the 11th International Conference on Computing, 2020

An Interdependency between Symmetric Ciphers and Hash Functions: A Survey.
Proceedings of the 11th International Conference on Computing, 2020

Generation of Symmetric Key Using Randomness of Hash Function.
Proceedings of the 11th International Conference on Computing, 2020

Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor Networks.
Proceedings of the 11th International Conference on Computing, 2020

An Improved and Reliable Sequential Decoding of Convolution Codes.
Proceedings of the 11th International Conference on Computing, 2020

Hardcoded Credentials and Insecure Data Transfer in IoT: National and International Status.
Proceedings of the 11th International Conference on Computing, 2020

An Experimental Evaluation of SHA-512 for Different Modes of Operation.
Proceedings of the 11th International Conference on Computing, 2020

Security issues and challenges in Healthcare Automated Devices.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

2019
E-VAR: enhanced void avoidance routing algorithm for underwater acoustic sensor networks.
IET Wirel. Sens. Syst., 2019

Mitigation of hard-coded credentials related attacks using QR code and secured web service for IoT.
Proceedings of the 10th International Conference on Computing, 2019

A Survey on Wired, Wireless, and Internet of Things Routing Protocols.
Proceedings of the 10th International Conference on Computing, 2019

2018
Implementation of the Event Service of Media Independent Handover for Wi-Fi in ns-3.
Proceedings of the 13th IEEE International Conference on Industrial and Information Systems, 2018

2017
Common TCP Evaluation Suite for ns-3: Design, Implementation and Open Issues.
Proceedings of the Workshop on ns-3, Porto, Portugal, June 13 - 14, 2017, 2017

2016
Simplified and improved multiple attributes alternate ranking method for vertical handover decision in heterogeneous wireless networks.
Comput. Commun., 2016

2015
Simplified and Improved Analytical Hierarchy Process Aid for Selecting Candidate Network in an Overlay Heterogeneous Networks.
Wirel. Pers. Commun., 2015

Mitigation of desynchronization attack during inter-eNodeB handover key management in LTE.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

2013
Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

Performance Comparison of Executing Fast Transactions in Bitcoin Network Using Verifiable Code Execution.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

2010
Congestion adaptive routing in Wireless Mesh Networks.
Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, 2010


  Loading...